Manage Private Networking for Cluster Linking on Confluent Cloud

The following sections describe supported cluster combinations, commands, configurations, use cases, and walkthroughs for private networking on Confluent Cloud.

Supported cluster combinations

Cluster Linking is fundamentally a networking feature: it copies data over the network. As such, Cluster Linking requires that at least one of the clusters involved has connectivity to the other cluster. Therefore, the networking situation of each cluster determines whether the two clusters can be linked, and whether the destination cluster or the source cluster must initiate the connection. By default, the destination cluster will initiate the connection. A special mode called “source-initiated links” allows the source cluster to initiate the connection of the cluster link.

The following tables show which networking combinations are possible, and whether a source-initiated link is required.

Tip

When using the Confluent Cloud Console to create cluster links, only linkable clusters are shown in the drop-down options. Clusters that cannot be linked are filtered out.

Confluent Cloud source and destination clusters

Source cluster Destination cluster Possible? Notes
Confluent Cloud - Basic or Standard cluster, or a Dedicated [1] cluster with secure public endpoints Confluent Cloud - Any Dedicated cluster Yes  
Confluent Cloud - Dedicated Cluster with AWS PrivateLink Confluent Cloud - Dedicated cluster with AWS PrivateLink Yes
  • Requires Network and Link Endpoint as shown here
  • Clusters must be in the same Confluent Cloud Organization
Confluent Cloud - Cluster with private networking Confluent Cloud - Dedicated cluster in the same Confluent Cloud network Yes  
Confluent Cloud - Dedicated cluster with Transit Gateway networking Confluent Cloud - Dedicated cluster with Transit Gateway networking Yes
Confluent Cloud - Cluster with private networking Confluent Cloud - Cluster with private networking Only the cases noted above
Confluent Cloud - Cluster with private networking Confluent Cloud - Dedicated cluster with public networking Yes
[1]Basic, Standard, and Dedicated cluster types are described in Supported cluster types.
[2]Preview scenarios are for testing and evaluation purposes or to give feedback to Confluent. They are not suitable for production use cases and do not fall into any Confluent Support SLAs.
[3]Classless Inter-Domain Routing (CIDR) is explained in the AWS documentation.

Note

To learn more about all available Confluent Cloud cluster types, see Kafka Cluster Types in Confluent Cloud. The above table shows supported cluster types for this particular Cluster Linking scenario (private networking). For a more general overview of supported cluster types for Cluster Linking, see Supported cluster types.

Confluent Platform and Confluent Cloud

Source cluster Destination cluster Possible? Notes
Confluent Platform 7.1.0 or later Confluent Cloud - Any Dedicated cluster Yes
  • Must use a source-initiated link
  • Source Confluent Platform cluster must have connectivity to the destination cluster
  • Brokers must be Confluent Server
Confluent Platform 5.4+ with public endpoints on all brokers Confluent Cloud - Any Dedicated cluster Yes
  • For AWS only. If egress static IP addresses are used, a firewall in front of Confluent Platform can filter on those IP addresses
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
Confluent Platform 5.4+ without public endpoints Confluent Cloud - A Dedicated cluster with VPC Peering, VNet Peering, or Transit Gateway Yes
  • Destination Confluent Cloud cluster must have connectivity to the source Confluent Cloud cluster
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
  • Your cloud networking must be configured to allow the Confluent Cloud cluster to reach the brokers on the source cluster
Confluent Cloud - A Basic or Standard cluster, or a Dedicated cluster with secure public endpoints Confluent Platform 7.0.0 or later Yes  
Confluent Cloud - A cluster with private networking Confluent Platform 7.0.0 or later Yes
  • Destination Confluent Platform cluster must have connectivity to the source Confluent Cloud cluster

Confluent Cloud and Apache Kafka®

Source cluster Destination cluster Possible? Notes
Kafka 2.4 or later with public endpoints on all brokers Confluent Cloud - Any Dedicated cluster Yes
  • For AWS only. If egress static IP addresses are used, a firewall in front of Confluent Platform can filter on those IP addresses
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
Kafka 2.4 or later without public endpoints Confluent Cloud - A Dedicated cluster with VPC Peering, VNet Peering, or Transit Gateway Yes
  • Destination Confluent Cloud cluster must have connectivity to the source Kafka cluster
  • Cluster link must use SASL/PLAIN, SASL/SCRAM, and/or mTLS
  • Your cloud networking must be configured to allow the Confluent Cloud cluster to reach the brokers on the source cluster

Diagrams of Supported Combinations for Private Networking

Confluent Cloud to Confluent Cloud

../../_images/cluster-link-private-net-cloud-to-cloud.png

Confluent Cloud to Confluent Platform/Apache Kafka®

../../_images/cluster-link-private-net-cloud-to-cp-kafka.png

Confluent Cloud billing considerations

There are cost differences associated with private vs. public networking. These are detailed under Cluster Linking in the Billing documentation. Examples are provided there for public networking, with more details about private networking to follow soon.